CVE-2021-20989

Fibaro Home Center 2 and Lite devices with firmware version 4.600 and older initiate SSH connections to the Fibaro cloud to provide remote access and remote support capabilities. This connection can be intercepted using DNS spoofing attack and a device initiated remote port-forward channel can be used to connect to the web management interface. Knowledge of authorization credentials to the management interface is required to perform any further actions.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:fibaro:home_center_2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:fibaro:home_center_2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:fibaro:home_center_lite_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:fibaro:home_center_lite:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:47

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2021/Apr/27 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2021/Apr/27 - Mailing List, Third Party Advisory
References () https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ - Exploit, Third Party Advisory () https://www.iot-inspector.com/blog/advisory-fibaro-home-center/ - Exploit, Third Party Advisory

Information

Published : 2021-04-19 14:15

Updated : 2024-11-21 05:47


NVD link : CVE-2021-20989

Mitre link : CVE-2021-20989

CVE.ORG link : CVE-2021-20989


JSON object : View

Products Affected

fibaro

  • home_center_2_firmware
  • home_center_lite_firmware
  • home_center_lite
  • home_center_2
CWE
CWE-295

Improper Certificate Validation